This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
FFIEC Guidelines and Compliance Categories FFIEC guidelines encompass a wide range of regulatory categories, including: Information Management and Security: Safeguarding sensitive consumer data. ConsumerProtection: Upholding fair lending and privacy standards. Mitigating threats such as hacking and cyber extortion.
Financial Data Protection Laws. financial data must comply with consumer-protection laws such as the Electronics Fund Transfer Act (EFTA) and a litany of regulations enforced by the SEC (such as Sarbanes-Oxley), CFTC, FISMA, and other financial regulatory bodies. Health data and patient data in the U.S.
Hearing on "Securing Consumers' Credit Data in the Age of Digital Commerce". Subcommittee on Digital Commerce and ConsumerProtection. In May 2016, one of its websites was hacked, resulting in 430,000 people having their personal information stolen. Fellow, Berkman Center for Internet and Society at Harvard Law School.
It’s about challenging our expectations about people who hack for a living. And, and that did that for 13 years and because of my involvement in critical infrastructure, I was asked by the White House to assist in developing the NIST cybersecurity framework in 2013. I hope you stick around.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content